
In this course you
- explain the rules of data management and protection in research
- depict a research code and explain procedures and infrastructure in which your rule is embedded
- justify your procedure of data management and protection
- request that other disciplines follow your procedure of data management and protection